khalifa toumi
khalifa toumi
Telecom Management SudParis
Adresse e-mail validée de telecom-sudparis.eu
Titre
Citée par
Citée par
Année
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments
K Toumi, C Andrés, A Cavalli
International Conference on Information Systems Security, 89-103, 2012
302012
Adaptive policy-driven attack mitigation in SDN
R Sahay, G Blanc, Z Zhang, K Toumi, H Debar
Proceedings of the 1st International Workshop on Security and Dependability …, 2017
172017
Link reliable and trust aware RPL routing protocol for Internet of Things
A Lahbib, K Toumi, S Elleuch, A Laouiti, S Martin
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
132017
Role based interoperability security policies in collaborative systems
K Toumi, A Cavalli, MEL Maarabani
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
122012
Blockchain based trust management mechanism for IoT
A Lahbib, K Toumi, A Laouiti, A Laube, S Martin
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-8, 2019
112019
A vector based model approach for defining trust in multi-organization environments
K Toumi, C Andrés, A Cavalli, M El Maarabani
2012 7th International Conference on Risks and Security of Internet and …, 2012
102012
A novel data exploitation framework based on blockchain
O Dib, C Huyart, K Toumi
Pervasive and Mobile Computing 61, 101104, 2020
92020
HAT: HIP address translation protocol for hybrid RFID/IP internet of things communication
K Toumi, M Ayari, LA Saidane, M Bouet, G Pujolle
2010 International Conference on Wireless and Ubiquitous Systems, 1-7, 2010
92010
HIP-Tags architecture implementation for the Internet of Things
P Urien, S Elrharbi, D Nyamy, H Chabanne, T Icart, F Lecocq, C Pépin, ...
2009 First Asian Himalayas International Conference on Internet, 1-5, 2009
82009
TrustCall: A trust computation model for Web conversational services
IT Javed, K Toumi, N Crespi
IEEE Access 5, 24376-24388, 2017
72017
Usage control policy enforcement in sdn-based clouds: A dynamic availability service use case
K Toumi, MS Idrees, F Charmet, R Yaich, G Blanc
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
52016
How to evaluate trust using MMT
K Toumi, W Mallouli, EM de Oca, C Andrés, A Cavalli
International Conference on Network and System Security, 484-492, 2015
52015
UTM-chain: blockchain-based secure unmanned traffic management for internet of drones
A Allouch, O Cheikhrouhou, A Koubâa, K Toumi, M Khalgui, ...
Sensors 21 (9), 3049, 2021
42021
An Event-B based approach for formal modelling and verification of smart contracts
A Lahbib, AA Wakrime, A Laouiti, K Toumi, S Martin
AINA 2020: 34th International Conference on Advanced Information Networking …, 2020
42020
Br2br: A vector-based trust framework for webrtc calling services
IT Javed, K Toumi, N Crespi, A Mohammadinejad
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
42016
On modeling and testing security properties of vehicular networks
MHE Aouadi, K Toumi, A Cavalli
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
42014
Decentralized identity systems: Architecture, challenges, solutions and future directions
O Dib, K Toumi
Annals of Emerging Technologies in Computing (AETiC), Print ISSN, 2516-0281, 2020
32020
DRMF: a Distributed Resource Management Framework for industry 4.0 environments
A Lahbib, K Toumi, A Laouiti, S Martin
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
32019
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach
F Charmet, R Waldinger, G Blanc, C Kiennert, K Toumi
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
32017
An active testing tool for security testing of distributed systems
MHE Aouadi, K Toumi, A Cavalli
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20